Types of Hackers: White Hat vs. Black Hat & Every Shade in Between

illustration of 3 fedora hats, white, gray and black

Shortly after the terrorist attacks in Paris went public, a group of hackers called “Anonymous” took action. A spokesperson for their group posted a YouTube video and said, “Wait, then, for a massive response from Anonymous…Wait for many cyberattacks…War has been declared. Prepare yourselves.” From here, they went on to take down what they claimed to be thousands of ISIS twitter accounts using combined hacking skills from members all over the globe.

Though it is debated whether this kind of cyber action is truly helpful, the response shows that hacking can take on many forms—some good, some bad and some falling into a rather gray zone.

If you have an interest in coding or programming, you’re probably aware that there are different types of hackers out there. You’ve possibly heard of the terms, “white hat,” “black hat” and “gray hat” hackers, but what do they really mean?

Read on to learn more about the distinguishing features of these hackers and how you could use your hacking skills for the good of others—even in a career.

3 types of hackers in the tech world

The term “hacker” carries a rather negative connotation for most people. But gone are the days where we view hackers as the iconic nerds sitting in a shabby basement with ski masks on.

Hacking skills have become more and more advanced and in-demand as both companies and countries strive to protect their information, software and networks. As a result of the demand, many more people possess formidable hacking skill these days.

But it’s up to them to decide if they’d like to use those skills for the benefit or detriment of the greater good.

1. Who are “black hat hackers?”

Black hat hackers are the criminals of the online world. These are the folks who give hackers a bad name. They are in it for often selfish reasons, exploiting individuals for money, prestige or incriminating information. These individuals have no regard for the law and often hack to commit other, bigger crimes.

“These are the hackers who violate computer security for personal gain,” explains Shawn Pope, CCNA Security Engineer for Nuspire. Examples of this would be stealing credit card information or identity theft.

Some black hat hackers just want the attention. “‘Script Kiddies’ is a derogatory term for black hat hackers who use borrowed programs to attack networks and deface websites in an attempt to make names for themselves,” says Robert Siciliano, identity theft expert with BestIDTheftCompanys.com.

Regardless of specific motivation, black hat hackers can be identified as those who use their abilities to exploit others for personal gain.

2. Who are “white hat hackers?”

“These are the good guys,” Siciliano says. “Computer security experts who specialize in penetration testing and other methodologies to ensure that a company’s information systems are secure.”

White hats, also known as “ethical hackers,” may help companies and governments find holes in their networks and security by first hacking into them. They hack into the systems to discover the liabilities before the bad guys do.

“If they do happen to find a security hole in the network or a flaw in software, they report these issues back to the organization so they can take the proper steps to address the vulnerabilities,” Pope explains.

Basically, if you have white hat hackers on your payroll, they want to get to any weaknesses in your database first, to help you fix the leaks before someone exploits them. There are several positions in which hackers can use their skills to help companies, protect information and even fight against cyber terrorism with their hacking abilities. Some career opportunities are outlined later in this article.

3. Who are “gray hat hackers?”

Gray hat hackers find themselves somewhere in the middle on the spectrum between helping others and self-gain. “Some gray hats, referred to as ‘hacktivists,’ look for ways to expose wrongdoing, exact revenge or harass a target,” according to Siciliano.

Technically, this kind of hacking is done without permission, so even if there is no malicious intent, it’s still considered illegal. Much like vigilante justice, gray hat hackers might produce desirable results, but they do so outside of the law.

“A gray hat hacker is the type that might exploit a vulnerability, but instead of using it for personal gain, they might then contact the organization and allow them to fix the problem,” Pope says. He adds that some gray hats might even post the vulnerability online for either a white hat or black hat to discover.

What are some careers for white hat hackers?

You now have a basic understanding of the differences between these types of hackers. If you’re intrigued at the idea of using your hacking skills for the greater good, you’re probably wondering what career opportunities are out there.

Here are three positions that are perfect for white hat hackers.

1. Cybersecurity engineer

“Using their advanced knowledge of malware, viruses, theft, DDoS attacks and other digital threats, cybersecurity engineers defend organizations against crime online,” Siciliano explains.

These professionals are, in simple terms, really good hackers. They build, maintain and improve IT security solutions for companies. As a cybersecurity engineer, you’ll perform vulnerability testing and security assessments, and creating solutions when problems are detected.

2. Malware analyst

Malware analysts are experts in malware, which is software intended to damage computers and computer systems. Siciliano compares them to oncologists fighting cancer. “There’s research, removal or treatment, and it’s up to you to decide how you apply your training.”

In this highly specialized information security position, you’ll be tasked with identifying and disabling new and dangerous forms of malware. You’ll need to be fluent in multiple programming languages, have a deep understanding of computer systems and be a master problem solver.

3. Chief information security officer (CISO)

If you’re extra ambitious, you may have your sights set on this senior-level information security career. The CISO is responsible for overseeing all cyber security efforts within an organization. “They help prep a company for combating cyberattacks, lead investigations searching for holes in a network, monitor security operations and manage other personnel,” according to Siciliano.

You’ll need to have a good amount of information security experience under your belt before advancing to this position, but once you do, you can use your hacking and security expertise to lead the charge for an entire army in the fight against cybercrime.

Join the fight

Now you have a basic understanding of white hat hackers versus black hat hackers (and those somewhere in between). These different types of hackers make up just a portion of the broader field of information security.

Learn about more career opportunities that leverage your skills and interests in our article, 5 Information Security Jobs that Help Combat Cybercrime.


About the author

Megan Ruesink

Megan is a freelance writer for Collegis education who writes student-focused articles on behalf of Rasmussen University. She hopes to engage and intrigue current and potential students.


Related Content

Related Content

This piece of ad content was created by Rasmussen University to support its educational programs. Rasmussen University may not prepare students for all positions featured within this content. Please visit www.rasmussen.edu/degrees for a list of programs offered. External links provided on rasmussen.edu are for reference only. Rasmussen University does not guarantee, approve, control, or specifically endorse the information or products available on websites linked to, and is not endorsed by website owners, authors and/or organizations referenced. Rasmussen University is accredited by the Higher Learning Commission, an institutional accreditation agency recognized by the U.S. Department of Education.

logo-accreditation-acen logo-accreditation-ccne chart-credential-laddering-associates-bachelors-masters 0 Credits 90 Credits 180 Credits 48 Credits Start Here HIGH SCHOOL GRADS Start Here TRANSFER STUDENTS Start Here SECOND DEGREE PURSUERS End Here ASSOCIATE'S DEGREE Start Here MASTER'S DEGREE PURSUERS End Here BACHELOR'S DEGREE End Here MASTER'S DEGREE chart-credential-laddering-associates-bachelors 0 Credits Start Here HIGH SCHOOL GRADS Start Here TRANSFER STUDENTS 90 Credits Start Here SECOND DEGREE PURSUERS End Here ASSOCIATE'S DEGREE 180 Credits End Here BACHELOR'S DEGREE chart-credential-laddering-msn chart-credential-laddering-nursing-programs chart-credential-laddering-nursing DNP MSN RN to BSN LPN to RN Bridge Accelerated BSN Professional Nursing ADN Practical Nursing Diploma Pre-Licensure Post-Licensure icon-colored-outline-bank icon-colored-outline-certificate icon-colored-outline-circle-dollar-sign icon-colored-outline-folder-search icon-colored-outline-hand-heart icon-colored-outline-head-blocks icon-colored-outline-head-cog icon-colored-outline-head-heart icon-colored-outline-health-plus-leaves icon-colored-outline-hospital icon-colored-outline-lifelong-learning icon-colored-outline-light-bulb-analytics icon-colored-outline-location-pin icon-colored-outline-magnifying-glass icon-colored-outline-monitor-healthcare icon-colored-outline-monitor-paper-search icon-colored-outline-nurse-rays icon-colored-outline-padlock-shield icon-colored-outline-person-presenter-screen icon-colored-outline-scales ras-logo-flame ras-logo-horizontal ras-logo-stacked icon-colored-advance icon-colored-arrows-cross-curve icon-colored-briefcase-star icon-colored-build icon-colored-bulb-analytics icon-colored-certificate icon-colored-continual-development icon-colored-duo-chatbox icon-colored-folder-mortarboard icon-colored-forward-ribbon icon-colored-gears-clock icon-colored-globe-pen icon-colored-growth icon-colored-hand-bubble icon-colored-hand-stars icon-colored-hands-gear icon-colored-head-blocks icon-colored-head-cog icon-colored-health-plus-leaves icon-colored-hospital-building icon-colored-laptop-cbe-skyscraper icon-colored-laptop-checkmark icon-colored-laptop-webpage icon-colored-location-map icon-colored-location-pin icon-colored-monitor-paper-scan icon-colored-mortarboard-dollar icon-colored-national icon-colored-people-chat-bubbles icon-colored-person-cheer-star icon-colored-person-laptop-checkboxes icon-colored-person-screen-instructor icon-colored-person-whiteboard icon-colored-phone-chatbox icon-colored-police-light icon-colored-prep icon-colored-presenter icon-colored-regional icon-colored-save-time icon-colored-shirt-hat icon-colored-skyscraper icon-colored-state icon-colored-student-centered icon-colored-support icon-colored-world-experience icon-triangle-arrow-up-plant icon-triangle-calendar-pencil icon-triangle-clock-rotating-arrows icon-triangle-display-gears icon-triangle-hand-right-speech-bubble icon-triangle-laptop-coding-brackets icon-triangle-mortarboard icon-triangle-paper-ribbon icon-triangle-person-cheer-star icon-triangle-person-juggle icon-triangle-triple-people-chat-bubble icon-modality-campus icon-modality-field icon-modality-online icon-modality-residential icon-arrow icon-bank icon-camera icon-filter icon-general-chart icon-general-connect icon-general-degree icon-general-discuss icon-general-email icon-general-find icon-general-hat icon-general-heart icon-general-laptop-building icon-general-laptop icon-general-leader icon-general-map icon-general-money icon-general-paperwork icon-general-people icon-general-phone icon-general-speak-out icon-head-heart icon-info-circle icon-mail-forward icon-mglass icon-play-solid icon-quote-mark-left icon-quote-mark-right icon-scales icon-share-square-o icon-simple-chat icon-simple-desktop icon-simple-find icon-simple-hamburger icon-simple-phone icon-spinner icon-tag icon-testimonial-quotes icon-util-checkbox-white icon-util-checkbox icon-util-checked-white icon-util-checked icon-util-chevron-down icon-util-chevron-left icon-util-chevron-right icon-util-chevron-up icon-util-circle-arrow-down icon-util-circle-dot icon-util-language-switch icon-util-loading icon-util-open-window-link icon-util-pdf-link icon-util-refresh icon-util-x rebrand-arrows icon-social-facebook-colored icon-social-facebook-square-colored icon-social-facebook-square icon-social-facebook icon-social-google-plus-square icon-social-google-plus icon-social-instagram-colored icon-social-instagram icon-social-linkedin-square-colored icon-social-linkedin-square icon-social-linkedin icon-social-pinterest-p-colored icon-social-pinterest-p icon-social-twitter-colored icon-social-twitter-square icon-social-twitter icon-social-youtube-play-colored icon-social-youtube-play graduate-cap-star-coin hand-coin hand-heart nurse-stethoscope-rays card-send-smile person-yoga-pose suitcase-star